Comment 18 for bug 1969629

Revision history for this message
Sergio Durigan Junior (sergiodj) wrote :

Verification for Focal.

First, verifying that the bug is reproducible:

# apt policy apache2
apache2:
  Installed: 2.4.41-4ubuntu3.10
  Candidate: 2.4.41-4ubuntu3.10
  Version table:
 *** 2.4.41-4ubuntu3.10 500
        500 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages
        500 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages
        100 /var/lib/dpkg/status
     2.4.41-4ubuntu3 500
        500 http://archive.ubuntu.com/ubuntu focal/main amd64 Packages

# while true; do if [[ $(curl -o /dev/null -s -k --http2 http://localhost/ -w '%{size_download}') == 0 ]]; then echo "BUG DETECTED"; break; fi; done
BUG DETECTED

Now, installing the package from -proposed and verifying that it fixes the bug:

# apt policy apache2
apache2:
  Installed: 2.4.41-4ubuntu3.11
  Candidate: 2.4.41-4ubuntu3.11
  Version table:
 *** 2.4.41-4ubuntu3.11 500
        500 http://archive.ubuntu.com/ubuntu focal-proposed/main amd64 Packages
        100 /var/lib/dpkg/status
     2.4.41-4ubuntu3.10 500
        500 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages
        500 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages
     2.4.41-4ubuntu3 500
        500 http://archive.ubuntu.com/ubuntu focal/main amd64 Packages

# while true; do if [[ $(curl -o /dev/null -s -k --http2 http://localhost/ -w '%{size_download}') == 0 ]]; then echo "BUG DETECTED"; break; fi; done
^C
#

As can be seen, the loop did not return right away and instead had to be manually stopped.

This concludes the verification for Focal.